Vulnerability assessment through mobile agents

被引:2
|
作者
Mallah, GA [1 ]
Shaikh, ZA [1 ]
机构
[1] FAST NU, Karachi, Pakistan
来源
E-TECH 2004 | 2004年
关键词
D O I
10.1109/ETECH.2004.1353850
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability assessment is the process of measuring and prioritizing the risks associated with network- and host based systems to allow balance planning of technologies and activities that manage business risk. That is useful for adapting security policy, Analysis of vulnerabilities, and creation of reports that effectively communicate security vulnerability discoveries and detailed corrective actions to all levels of an organization. While Vulnerability assessment is not a new technology, mobile agents offer many advantages to the traditional implementations. The most significant contribution is the increased ability for system administrators to quickly and easily adds distributed components to existing systems that can look for newly published vulnerabilities. This paper suggests the Vulnerability Assessment through Mobile Agents where both Network and Host-based technologies in coordinated fashion using Mobile Agents will provide the best vulnerability assessment for measuring an organization's security risks. Mobile agent targets the intended host or network, capture, analyze, scan all vulnerabilities and report to the master agent/server for comprehensive analysis & security assessment, and master agent will act accordingly. The paper will also address advantages and issues regarding its implementation.
引用
收藏
页码:92 / 96
页数:5
相关论文
共 50 条
  • [1] Replication Strategies of Mobile Agents for Autonomous Vulnerability Mitigation
    Aurisch, Thorsten
    Jacke, Andreas
    2019 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2019,
  • [2] Vulnerability Analysis and Patches Management using Secure Mobile Agents
    Stirparo, Pasquale
    Shibli, Muhammad Awais
    Muftic, Sead
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1054 - 1058
  • [3] Addressing mobile HCI needs through agents
    O'Hare, G
    O'Grady, M
    HUMAN COMPUTER INTERACTION WITH MOBILE DEVICES, 2002, 2411 : 311 - 314
  • [4] Vulnerability assessment through integrated transportation analysis
    Hood, JN
    Olivas, T
    Slocter, CB
    Howard, B
    Albright, DP
    TRANSPORTATION SECURITY AND INFRASTRUCTURE PROTECTION: SAFETY AND HUMAN PERFORMANCE, 2003, (1822): : 18 - 23
  • [5] Vulnerability assessment through integrated transportation analysis
    Hood, Jacqueline N.
    Olivas, Tim
    Slocter, Chuck B.
    Howard, Barry
    Albright, David P.
    Transportation Research Record, 2003, (1822) : 18 - 23
  • [6] Assessment of Flood Vulnerability Through a Multidimensional Index
    Gomez Vaca, Ana Noemi
    Rodriguez-Roda, Ignasi
    Abily, Morgan
    ADVANCES IN HYDROINFORMATICS, VOL 1, SIMHYDRO 2023, 2024, : 67 - 78
  • [7] Improving resilience through vulnerability assessment and management
    Agarwal, Jitendra
    CIVIL ENGINEERING AND ENVIRONMENTAL SYSTEMS, 2015, 32 (1-2) : 5 - 17
  • [8] Facilitating Vulnerability Assessment through PoC Migration
    Dai, Jiarun
    Zhang, Yuan
    Xu, Hailong
    Lyu, Haiming
    Wu, Zicheng
    Xing, Xinyu
    Yang, Min
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3300 - 3317
  • [9] Earthquake vulnerability assessment of a mobile jackup platform in the Gulf of Suez
    Elsayed, T.
    El-Shaib, M.
    Holmas, Tore
    SHIPS AND OFFSHORE STRUCTURES, 2015, 10 (06) : 609 - 620
  • [10] Enabling mobile agents interoperability through FIPA standards
    Ametller-Esquerra, Joan
    Cucurull-Juan, Jordi
    Marti, Ramon
    Navarro, Guillermo
    Robles, Sergi
    COOPERATIVE INFORMATION AGENTS X, PROCEEDINGS, 2006, 4149 : 388 - 401